Breaking News

Arctic announces Senza AI 370 Under Desk PC for AI Applications CORSAIR Announces the Airflow-focused 3200D Mid Tower for Ambitious DIY PC Builds Silicon Power Launches Enterprise-Grade DDR5 RDIMM to Accelerate AI Workloads World Backup Day 2026: A Backup Doesn’t Always Need to be in the Cloud Sharkoon announces S100 ARGB AIO Cooler

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Microsoft Sees Decline in Security Vulnerabilities

Microsoft Sees Decline in Security Vulnerabilities

Enterprise & IT May 7,2014 0

Microsoft's latest cybersecurity report, released Wednesday, shows a 70 percent decline in the number of severe vulnerabilities that were exploited in Microsoft products between 2010 and 2013. The report suggests that the security measures Microsoft has included in newer software has helped make life more difficult for would-be attackers, writes Tim Rains, Microsoft's Trustworthy Computing director.

But the data also indicates that cybercriminals are increasingly using deceptive tactics in their attempts to compromise computer systems. In the second half of 2013, there was a noticeable increase in cybercriminal activity where attackers used deceptive practices; in the last quarter of 2013, "the number of computers impacted as a result of deceptive tactics more than tripled," Rains says.

Foremost among the tactics many attackers are using is "deceptive downloads," according to Microsoft. In more than 95% of the 110 countries/regions Microsoft studied, deceptive downloads were a top threat. Cybercriminals are secretly bundling malicious items with legitimate content such as software, games or music. Taking advantage of people's desire to get a good deal, cybercriminals are bundling malware with free programs and free software packages that can be downloaded online. The free download also comes with other add-ons. In addition to what the person thought they were getting, the download also installs malware. The malware may be installed immediately or at a later date as it assesses the victim's computer's profile. It could be months or even years before the victim notices the infection, as often these malicious items operate behind the scenes with the only visible effect being slower performance on the system that was infected.

A second notable deceptive tactic in use was Ransomware. The concept is simple: cybercriminals digitally hijack a person's machine and hold it for ransom; refusing to return control of it or their files until the victim pays a fee. In many cases, control of the computer or files is never returned to the victim, causing them to lose valuable data, pictures, movies, music, etc. Between the first and second halves of 2013, the top ransomware threat encountered globally, increased by 45 percent. The data suggests that ransomware threats are typically geographically concentrated for periods of time. For cybercriminals looking to make a quick buck, this is an increasingly alluring tactic.

While deceptive tactics have increased in prevalence, there are actions people can take to help protect themselves and their organizations. Using newer software whenever possible and keeping it up to date, only downloading software from trusted sources, avoid opening email and instant messages from untrusted or unknown senders, running antivirus software and keeping it up to date, and backing up valuable data and files, make it much harder for attackers who use deceptive practices to be successful.

Tags: Cyber Attack
Previous Post
GLOBALFOUNDRIES Introduces 55nm Automotive-Specific Semiconductor Manufacturing Platform
Next Post
DVD Writer and Media Market Keeps Shrinking

Related Posts

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Texas Courts Faced a Ransomware Attack

  • GoDaddy Discloses Data Breach

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

  • Marriott Discloses New Data Breach

  • FireEye Warns About Chinese APT41 Global Intrusion Campaign Using Multiple Exploits

  • Cybersecurity Report Reveals Big Game Hunting, Telecommunication Targeting Take Center Stage for Cyber Adversaries

  • MGM Resorts Discloses Data Breach

Latest News

Arctic announces Senza AI 370 Under Desk PC for AI Applications
Consumer Electronics

Arctic announces Senza AI 370 Under Desk PC for AI Applications

CORSAIR Announces the Airflow-focused 3200D Mid Tower for Ambitious DIY PC Builds
Cooling Systems

CORSAIR Announces the Airflow-focused 3200D Mid Tower for Ambitious DIY PC Builds

Silicon Power Launches Enterprise-Grade DDR5 RDIMM to Accelerate AI Workloads
Enterprise & IT

Silicon Power Launches Enterprise-Grade DDR5 RDIMM to Accelerate AI Workloads

World Backup Day 2026: A Backup Doesn’t Always Need to be in the Cloud
Enterprise & IT

World Backup Day 2026: A Backup Doesn’t Always Need to be in the Cloud

Sharkoon announces S100 ARGB AIO Cooler
Cooling Systems

Sharkoon announces S100 ARGB AIO Cooler

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Arctic Liquid Freezer III 360 Pro Argb

Arctic Liquid Freezer III 360 Pro Argb

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed